993 resultados para Forest protection


Relevância:

20.00% 20.00%

Publicador:

Resumo:

This exhibition was the outcome of a personal arts-based exploration of the meaning of interiority. Through the process it was found that existentially the architectural wall differentiating inside from outside does not exist but operates as a space of overlap, a groundless ground providing for dwelling in the real existential sense of the word.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Denial-of-service attacks (DoS) and distributed denial-of-service attacks (DDoS) attempt to temporarily disrupt users or computer resources to cause service un- availability to legitimate users in the internetworking system. The most common type of DoS attack occurs when adversaries °ood a large amount of bogus data to interfere or disrupt the service on the server. The attack can be either a single-source attack, which originates at only one host, or a multi-source attack, in which multiple hosts coordinate to °ood a large number of packets to the server. Cryptographic mechanisms in authentication schemes are an example ap- proach to help the server to validate malicious tra±c. Since authentication in key establishment protocols requires the veri¯er to spend some resources before successfully detecting the bogus messages, adversaries might be able to exploit this °aw to mount an attack to overwhelm the server resources. The attacker is able to perform this kind of attack because many key establishment protocols incorporate strong authentication at the beginning phase before they can iden- tify the attacks. This is an example of DoS threats in most key establishment protocols because they have been implemented to support con¯dentiality and data integrity, but do not carefully consider other security objectives, such as availability. The main objective of this research is to design denial-of-service resistant mechanisms in key establishment protocols. In particular, we focus on the design of cryptographic protocols related to key establishment protocols that implement client puzzles to protect the server against resource exhaustion attacks. Another objective is to extend formal analysis techniques to include DoS- resistance. Basically, the formal analysis approach is used not only to analyse and verify the security of a cryptographic scheme carefully but also to help in the design stage of new protocols with a high level of security guarantee. In this research, we focus on an analysis technique of Meadows' cost-based framework, and we implement DoS-resistant model using Coloured Petri Nets. Meadows' cost-based framework is directly proposed to assess denial-of-service vulnerabil- ities in the cryptographic protocols using mathematical proof, while Coloured Petri Nets is used to model and verify the communication protocols using inter- active simulations. In addition, Coloured Petri Nets are able to help the protocol designer to clarify and reduce some inconsistency of the protocol speci¯cation. Therefore, the second objective of this research is to explore vulnerabilities in existing DoS-resistant protocols, as well as extend a formal analysis approach to our new framework for improving DoS-resistance and evaluating the performance of the new proposed mechanism. In summary, the speci¯c outcomes of this research include following results; 1. A taxonomy of denial-of-service resistant strategies and techniques used in key establishment protocols; 2. A critical analysis of existing DoS-resistant key exchange and key estab- lishment protocols; 3. An implementation of Meadows's cost-based framework using Coloured Petri Nets for modelling and evaluating DoS-resistant protocols; and 4. A development of new e±cient and practical DoS-resistant mechanisms to improve the resistance to denial-of-service attacks in key establishment protocols.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This article explains the relevance of the Code and its place in the regulatory framework, discusses some of the key issues arising in the recent review (as identified by consumer advocates1), and explains the relationship between the Code and the Financial Ombudsman Service.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

More than a century ago in their definitive work “The Right to Privacy” Samuel D. Warren and Louis D. Brandeis highlighted the challenges posed to individual privacy by advancing technology. Today’s workplace is characterised by its reliance on computer technology, particularly the use of email and the Internet to perform critical business functions. Increasingly these and other workplace activities are the focus of monitoring by employers. There is little formal regulation of electronic monitoring in Australian or United States workplaces. Without reasonable limits or controls, this has the potential to adversely affect employees’ privacy rights. Australia has a history of legislating to protect privacy rights, whereas the United States has relied on a combination of constitutional guarantees, federal and state statutes, and the common law. This thesis examines a number of existing and proposed statutory and other workplace privacy laws in Australia and the United States. The analysis demonstrates that existing measures fail to adequately regulate monitoring or provide employees with suitable remedies where unjustifiable intrusions occur. The thesis ultimately supports the view that enacting uniform legislation at the national level provides a more effective and comprehensive solution for both employers and employees. Chapter One provides a general introduction and briefly discusses issues relevant to electronic monitoring in the workplace. Chapter Two contains an overview of privacy law as it relates to electronic monitoring in Australian and United States workplaces. In Chapter Three there is an examination of the complaint process and remedies available to a hypothetical employee (Mary) who is concerned about protecting her privacy rights at work. Chapter Four provides an analysis of the major themes emerging from the research, and also discusses the draft national uniform legislation. Chapter Five details the proposed legislation in the form of the Workplace Surveillance and Monitoring Act, and Chapter Six contains the conclusion.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This issue of the Griffith Law Review focuses on consumer law, and the pervasive nature of this area of law. We are all consumers, but do not necessarily identify as such, nor are we a homogeneous group. The boundaries of

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The requirement for improved efficiency whilst maintaining system security necessitates the development of improved system analysis approaches and the development of advanced emergency control technologies. Load shedding is a type of emergency control that is designed to ensure system stability by curtailing system load to match generation supply. This paper presents a new adaptive load shedding scheme that provides emergency protection against excess frequency decline, whilst minimizing the risk of line overloading. The proposed load shedding scheme uses the local frequency rate information to adapt the load shedding behaviour to suit the size and location of the experienced disturbance. The proposed scheme is tested in simulation on a 3-region, 10-generator sample system and shows good performance.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Current approaches to managing and supporting staff and addressing turnover in child protection predominantly rely on deficit-based models that focus on limitations, shortcomings, and psychopathology. This article explores an alternative approach, drawing on models of resilience, which is an emerging field linked to trauma and adversity. To date, the concept of resilience has seen limited application to staff and employment issues. In child protection, staff typically face a range of adverse and traumatic experiences that have flow-on implications, creating difficulties for staff recruitment and retention and reduced service quality. This article commences with discussion of the multifactorial influences of the troubled state of contemporary child protection systems on staffing problems. Links between these and difficulties with the predominant deficit models are then considered. The article concludes with a discussion of the relevance and utility of resilience models in developing alternative approaches to child protection staffing issues.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

"For every complex problem there is a solution that is simple, neat and wrong (M.L. Mencken, US writer and social commentator). Nowhere is this quote more apt than when applied to finding over-simplified solutions to the complex problem of looking after the safety and well-being of vulnerable children. The easiest formula is, of course, to ‘rescue children from dysfunctional families’, a line taken recently in the monograph by the right wing think tank, Centre for Independent Studies (Sammut & O’Brien 2009). It is reasoning with fatal flaws. This commentary provides a timely reminder of the strong arguments which lie behind the national and international shift to supporting children and families through universal and specialist community-based services, rather than weighting all resources into statutory child protection interventions. A brief outline of the value of developing the resources to support children in their families, and the problems with 'rescuing' children through the child protection system are discussed.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Background: All Canadian jurisdictions require certain professionals to report suspected or observed child maltreatment. This study examined the types of maltreatment, level of harm and child functioning issues, controlling for family socioeconomic status, age and gender of the child reported by healthcare and non-healthcare professionals. Methods: We conducted chi-square analyses and logistic regression on a national child welfare sample from the 2003 Canadian Incidence Study of Reported Child Abuse and Neglect (CIS-2003) and compared the differences in professional reporting with its previous cycle (CIS-1998) using Bonferroni-corrected confidence intervals. Results: Our analysis of CIS-2003 data revealed that the majority of substantiated child maltreatment is reported to service agencies by non-healthcare professionals (57%), followed by non-professionals (33%) and healthcare professionals (10%). The number of professional reports increased 2.5 times between CIS-1998 and CIS-2003, while non-professionals’ increased 1.7 times. Of the total investigations, professional reports represented 59% in CIS-1998 and 67% in CIS-2003 (p<0.001). Compared to non-healthcare professionals, healthcare professionals more often reported younger children, children who experienced neglect and emotional maltreatment and those assessed as suffering harm and child functioning issues, but less often exposure to domestic violence. Conclusion: The results indicate that healthcare professionals played an important role in identifying children in need of protection considering harm and other child functioning issues. The authors discuss the reasons why underreporting is likely to remain an issue.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper describes protection and control of a microgrid with converter interfaced micro sources. The proposed protection and control scheme consider both grid connected and autonomous operation of the microgrid. A protection scheme, capable of detecting faults effectively in both grid connected and islanded operations is proposed. The main challenge of the protection, due to current limiting state of the converters is overcome by using admittance relays. The relays operate according to the inverse time characteristic based on measured admittance of the line. The proposed scheme isolates the fault from both sides, while downstream side of the microgrid operates in islanding condition. Moreover faults can be detected in autonomous operation. In grid connected mode distributed generators (DG) supply the rated power while in absence of the grid, DGs share the entire power requirement proportional to rating based on output voltage angle droop control. The protection scheme ensures minimum load shedding with isolating the faulted network and DG control provides a smooth islanding and resynchronization operation. The efficacy of coordinated control and protection scheme has been validated through simulation for various operating conditions.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Field experiences for young children are an ideal medium for environmental education/education for sustainability because of opportunities for direct experience in nature, integrated learning, and high community involvement. This research documented the development - in 4-5 year old Prep children - of knowledge, attitudes and actions/advocacy in support of an endangered native Australian animal, the Greater Bilby. Data indicated that children gained new knowledge, changed attitudes and built a repertoire of action/ advocacy strategies in native animal conservation as a result of participating in a forest field adventure. The curriculum and pedagogical features that supported these young children’s learning include: active engagement in a natural environment, learning through curriculum integration at home and at school, anthropomorphic representations of natural elements, making connections with cultural practices, and intergenerational learning. The paper also highlights research strategies that can be usefully and ethically applied when conducting studies involving young children.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Exposure of the skin to sunlight can cause skin cancer and is also necessary for cutaneous vitamin D production. Media reports have highlighted the purported health benefits of vitamin D. Our aim was to examine attitudes and behaviours related to sun protection and vitamin D. A cross-sectional study of 2,001 residents in Queensland, Australia aged 20-70 years was undertaken. Information collected included: skin cancer risk factors; perceptions about levels of sun exposure required to maintain vitamin D; belief that sun protection increases risk of vitamin D deficiency; intention, and actual change in sun protection practices for adults and children. Multivariate models examined predictors of attitudinal and behavioural change. One-third (32%) believed a fair-skinned adult, and 31% thought a child required at least 30 minutes per day in summer sun to maintain vitamin D levels. Reductions in sun protection were reported by 21% of adults and 14% of children. Factors associated with belief that sun protection may result in not obtaining enough vitamin D included aged ≥ 60 years (OR=1.35, 95% CI 1.09-1.66) and having skin that tanned easily (OR=1.96, 95% CI 1.38-2.78). Participants from low income households, and those who frequently used sun protective clothing were more likely to have reduced sun protection practices (OR=1.33, 95% CI 1.10-1.73 and OR=1.73, 95% CI 1.36-2.20, respectively). This study provides evidence of reductions in sun protection practices in a population living in a high UV environment. There is an urgent need to re-focus messages regarding sun exposure and for continued sun protection practices.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Abstract Neopolycystus sp. is the only primary egg parasitoid associated with the pest beetle Paropsis atomaria in subtropical eucalypt plantations, but its impact on its host populations is unknown. The simplified ecosystem represented by the plantation habitat, lack of interspecific competition for host and parasitoid, and the multivoltinism of the host population makes this an ideal system for quantifying the direct and indirect effects of egg parasitism, and hence, effects on host population dynamics. Within-, between- and overall-egg-batch parasitism rates were determined at three field sites over two field seasons, and up to seven host generations. The effect of exposure time (egg batch age), host density proximity to native forest and water sources on egg parasitism rates was also tested. Neopolycystus sp. exerts a significant influence on P. atomaria populations in Eucalyptus cloeziana. plantations in south-eastern Queensland, causing the direct (13%) and indirect (15%) mortality of almost one-third of all eggs in the field. Across seasons and generations, 45% of egg batches were parasitised, with a within-batch parasitism rate of around 30%. Between-batch parasitism increased up to 5–6 days after oviposition in the field, although within-batch parasitism rates generally did not. However, there were few apparent patterns to egg parasitism, with rates often varying significantly between sites and seasons.